pwn.college - Hacking

mp4   Hot:87   Size:6.73 GB   Created:2022-04-22 09:42:46   Update:2023-06-06 16:47:34  

Download link

File List

  • Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 20 2020.eng.srt 135.1 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 20 2020.mp4 106.36 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 27 2020.eng.srt 157.22 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 27 2020.mp4 96.37 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 12 5 2020.eng.srt 126.11 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 12 5 2020.mp4 110.59 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 9 8 2020.eng.srt 105.49 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 9 8 2020.mp4 59.6 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 18 2020.eng.srt 187.22 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 18 2020.mp4 359.07 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 25 2020.mp4 381.09 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 12 2 2020.eng.srt 259.59 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 12 2 2020.mp4 390.77 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 14 2020.eng.srt 221.07 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 14 2020.mp4 374.93 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 7 2020.eng.srt 192.11 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 7 2020.mp4 375.61 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 2 2020.eng.srt 214.35 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 2 2020.mp4 375.66 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 9 2020.eng.srt 222.6 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 9 2020.mp4 351.21 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Office Hours 9 7 2020.eng.srt 100.93 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Office Hours 9 7 2020.mp4 173.79 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 16 2020.eng.srt 64.67 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 16 2020.mp4 114.95 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 23 2020.eng.srt 66 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 23 2020.mp4 145.77 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 30 2020.eng.srt 67.77 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 30 2020.mp4 135.5 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 12 7 2020.eng.srt 113.64 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 12 7 2020.mp4 191.91 MB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 9 14 2020.eng.srt 76.61 KB
    Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 9 14 2020.mp4 127.42 MB
    Extra - CSE466/CSE 466 - Computer Systems Security Lecture 1 Introduction.eng.srt 166.73 KB
    Extra - CSE466/CSE 466 - Computer Systems Security Lecture 1 Introduction.mp4 186.27 MB
    Extra - CSE466/CSE 466 - Computer Systems Security Office Hours 8 31 2020.eng.srt 84.29 KB
    Extra - CSE466/CSE 466 - Computer Systems Security Office Hours 8 31 2020.mp4 151.61 MB
    Slides/00 Fundamentals/Fundamentals_ Assembly.pptx 1.54 MB
    Slides/00 Fundamentals/Fundamentals_ Binary Files.pptx 1.73 MB
    Slides/00 Fundamentals/Fundamentals_ Computer Architecture.pptx 1.85 MB
    Slides/00 Fundamentals/Fundamentals_ Linux Process Loading.pptx 1.3 MB
    Slides/00 Fundamentals/Fundamentals_ Linux Processes Execution.pptx 1.48 MB
    Slides/00 Fundamentals/The Secret Life of Hello World.pptx 2.91 MB
    Slides/00 Introduction/Introduction 1_ Computer Systems Security.pptx 6.59 MB
    Slides/00 Introduction/Introduction 1_ Computer Systems and Security (new).pptx 1.83 MB
    Slides/00 Introduction/Introduction 2_ Computer Systems Security (new).pptx 5.35 MB
    Slides/00 Introduction/Introduction 2_ This Course.pptx 811.48 KB
    Slides/00 Introduction/Introduction 3_ Cybersecurity Ethics.pptx 611.18 KB
    Slides/00 Introduction/Introduction 4_ Careers.pptx 4.05 MB
    Slides/01 Program Misuse/Program Misuse 1_ Introduction.pptx 1.52 MB
    Slides/01 Program Misuse/Program Misuse 2_ Mitigations (New).pptx 1.2 MB
    Slides/02 Shellcoding/Shellcoding 1_ Introduction (new).pptx 6.3 MB
    Slides/02 Shellcoding/Shellcoding 2_ Writing Shellcode (new).pptx 1.44 MB
    Slides/02 Shellcoding/Shellcoding 3_ Debugging Shellcode (new).pptx 1.43 MB
    Slides/02 Shellcoding/Shellcoding 4_ Cross-Architecture Shellcode (new).pptx 1.27 MB
    Slides/02 Shellcoding/Shellcoding 5_ Common Challenges.pptx 1.61 MB
    Slides/02 Shellcoding/Shellcoding 6_ Data Execution Prevention.pptx 1.98 MB
    Slides/02 Shellcoding/Shellcoding_ Introduction.pptx 6.33 MB
    Slides/03 Sandboxing/Sandboxing 1_ Introduction.pptx 3 MB
    Slides/03 Sandboxing/Sandboxing 2_ chroot.pptx 1.2 MB
    Slides/03 Sandboxing/Sandboxing 3_ seccomp.pptx 1.19 MB
    Slides/03 Sandboxing/Sandboxing 4_ Escaping seccomp.pptx 1.21 MB
    Slides/03 Sandboxing/Sandboxing 5_ Modern Jails (cgroups and namespaces).pptx 1.19 MB
    Slides/04 Reverse Engineering/Reversing 1_ Introduction.pptx 1.31 MB
    Slides/04 Reverse Engineering/Reversing 2_ Functions and Frames.pptx 1.62 MB
    Slides/04 Reverse Engineering/Reversing 3_ Understanding Data Access.pptx 1.53 MB
    Slides/04 Reverse Engineering/Reversing 4_ Static Reversing.pptx 1.2 MB
    Slides/04 Reverse Engineering/Reversing 5_ Dynamic Reversing.pptx 1.2 MB
    Slides/04 Reverse Engineering/Reversing 6_ Examples.pptx 4.6 MB
    Slides/05 Memory Errors/Memory Errors 1_ Introduction.pptx 7.72 MB
    Slides/05 Memory Errors/Memory Errors 2_ High-level Problems.pptx 2.82 MB
    Slides/05 Memory Errors/Memory Errors 3_ Smashing the Stack.pptx 1.54 MB
    Slides/05 Memory Errors/Memory Errors 4_ Causes of Corruption.pptx 1.36 MB
    Slides/05 Memory Errors/Memory Errors 5_ Stack Canaries.pptx 1.98 MB
    Slides/05 Memory Errors/Memory Errors 6_ ASLR.pptx 1.26 MB
    Slides/05 Memory Errors/Memory Errors 7_ Causes of Disclosure.pptx 1.2 MB
    Slides/06 Exploitation/Exploitation Scenarios_ Achieving Control.pptx 6.28 MB
    Slides/06 Exploitation/Exploitation Scenarios_ Control Flow Hijack to Shellcode.pptx 617.63 KB
    Slides/06 Exploitation/Exploitation Scenarios_ JIT Spraying!.pptx 614.51 KB
    Slides/06 Exploitation/Exploitation Scenarios_ Vulnerability Side-Effects.pptx 610.91 KB
    Slides/07 Return Oriented Programming/ROP 1_ Introduction.pptx 1.94 MB
    Slides/07 Return Oriented Programming/ROP 2_ Binary Lego.pptx 6.84 MB
    Slides/07 Return Oriented Programming/ROP 3_ Techniques.pptx 1.29 MB
    Slides/07 Return Oriented Programming/ROP 4_ Complications.pptx 1.34 MB
    Slides/08 Dynamic Allocator Misuse/Heap 1_ Introduction.pptx 3.39 MB
    Slides/08 Dynamic Allocator Misuse/Heap 2_ Dangers.pptx 1.54 MB
    Slides/08 Dynamic Allocator Misuse/Heap 3_ tcache.pptx 1.27 MB
    Slides/08 Dynamic Allocator Misuse/Heap 4_ Metadata and Chunks.pptx 1.38 MB
    Slides/08 Dynamic Allocator Misuse/Heap 5_ Metadata Corruption.pptx 1.3 MB
    Slides/09 Race Conditions/Race Conditions 1_ Introduction.pptx 1.39 MB
    Slides/09 Race Conditions/Race Conditions 2_ Races in the Filesystem.pptx 662.17 KB
    Slides/09 Race Conditions/Race Conditions 3_ Process and Threads.pptx 622.3 KB
    Slides/09 Race Conditions/Race Conditions 4_ Races in Memory.pptx 622.25 KB
    Slides/09 Race Conditions/Race Conditions 5_ Signals and Reentrancy.pptx 872.86 KB
    Slides/10 Kernel Exploitation/Kernel 1_ Introduction.pptx 2.95 MB
    Slides/10 Kernel Exploitation/Kernel 2_ Environment Setup.pptx 1.2 MB
    Slides/10 Kernel Exploitation/Kernel 3_ Kernel Modules.pptx 1.22 MB
    Slides/10 Kernel Exploitation/Kernel 4_ Privilege Escalation.pptx 1.37 MB
    Slides/11 Advanced Exploitation/Advanced Exploitation 1_ Introduction.pptx 1006.56 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 2_ Heap Address Disclosure via Race Condition.pptx 659.77 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 3_ Memory Forensics.pptx 612.05 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 4_ Exploit Primitives.pptx 675.08 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 5_ End-to-End.pptx 616.08 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 6_ Kernel Allocators.pptx 602.76 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 7_ Kernel Races.pptx 615.11 KB
    Slides/11 Advanced Exploitation/Advanced Exploitation 8_ Escaping Seccomp (for real!).pptx 1.27 MB
    Slides/11 Advanced Exploitation/Advanced Exploitation 9_ Kernel Mitigations.pptx 599.71 KB
    Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 1_ Introduction.pptx 1.55 MB
    Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 2_ Static Analysis.pptx 665.94 KB
    Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 3_ Fuzzing.pptx 821.66 KB
    Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 4_ Dynamic Symbolic Execution.pptx 7.33 MB
    Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 5_ The Cyber Grand Challenge.pptx 11.06 MB
    Slides/State of the Course.pptx 100.94 MB
    Slides/X Format String Vulnerabilities/Format Strings_ Reading Memory.pptx 1.28 MB
    Slides/X Format String Vulnerabilities/Format Strings_ Writing Memory.pptx 1.63 MB
    Videos/00 Fundamentals 1 Computer Architecture.mp4 20.85 MB
    Videos/00 Fundamentals 2 Assembly.mp4 75.71 MB
    Videos/00 Fundamentals 3 Binary Files.mp4 43.49 MB
    Videos/00 Fundamentals 4 Linux Process Loading.mp4 110.63 MB
    Videos/00 Fundamentals 5 Linux Process Execution.mp4 80.89 MB
    Videos/00 Introduction 1 What is Computer Systems Security.mp4 50.69 MB
    Videos/01 Program Misuse 1 Program Misuse.mp4 64.71 MB
    Videos/02 Shellcoding 1 Introduction.mp4 85.56 MB
    Videos/02 Shellcoding 2 Common Challenges.mp4 35.32 MB
    Videos/02 Shellcoding 3 Data Execution Prevention.mp4 25.02 MB
    Videos/03 Sandboxing 1 Introduction.mp4 20.69 MB
    Videos/03 Sandboxing 2 chroot.mp4 41.05 MB
    Videos/03 Sandboxing 3 seccomp.mp4 22.78 MB
    Videos/03 Sandboxing 4 Escaping seccomp.mp4 33.69 MB
    Videos/04 Reverse Engineering 1 Introduction.mp4 24.83 MB
    Videos/04 Reverse Engineering 2 Data Acces.mp4 12.21 MB
    Videos/04 Reverse Engineering 3 Functions and Frames.mp4 33.99 MB
    Videos/04 Reverse Engineering 4 Static Tools.mp4 29.65 MB
    Videos/04 Reverse Engineering 5 Dynamic Tools.mp4 39.55 MB
    Videos/04 Reverse Engineering 6 Real-world Applications.mp4 21.62 MB
    Videos/05 Memory Errors 1 Introduction.mp4 18.44 MB
    Videos/05 Memory Errors 2 High-level Problems.mp4 21.85 MB
    Videos/05 Memory Errors 3 Smashing the Stack.mp4 33.29 MB
    Videos/05 Memory Errors 4 Causes of Corruption, Part 1.mp4 25.03 MB
    Videos/05 Memory Errors 5 Causes of Corruption, Part 2.mp4 42.92 MB
    Videos/05 Memory Errors 6 Stack Canaries.mp4 41.4 MB
    Videos/05 Memory Errors 7 Address Space Layout Randomization.mp4 40.49 MB
    Videos/05 Memory Errors 8 Causes of Disclosure.mp4 33.78 MB
    Videos/06 Exploitation 1 Introduction.mp4 12.52 MB
    Videos/06 Exploitation 2 Hijacking to Shellcode.mp4 24.45 MB
    Videos/06 Exploitation 3 Side Effects.mp4 15.29 MB
    Videos/06 Exploitation 4 JIT Spray.mp4 13.22 MB
    Videos/07 Return Oriented Programming 1 Introduction.mp4 15.03 MB
    Videos/07 Return Oriented Programming 2 Binary Lego.mp4 38.88 MB
    Videos/07 Return Oriented Programming 3 Techniques.mp4 48.68 MB
    Videos/07 Return Oriented Programming 4 Complications.mp4 35.61 MB
    Videos/08 Kernel 1 Introduction.mp4 55.63 MB
    Videos/08 Kernel 2 Environmental Setup.mp4 56.78 MB
    Videos/08 Kernel 3 Kernel Modules.mp4 56.06 MB
    Videos/08 Kernel 4 Privilege Escalation.mp4 24.69 MB
    Videos/09 Heap 1 What is the Heap.mp4 43.88 MB
    Videos/09 Heap 2 Dangers.mp4 51.36 MB
    Videos/09 Heap 3 tcache.mp4 43.32 MB
    Videos/09 Heap 4 Chunks and Metadata.mp4 50.8 MB
    Videos/09 Heap 5 Metadata Corruption.mp4 31.27 MB
    Videos/10 Race Conditions 1 Introduction.mp4 30.97 MB
    Videos/10 Race Conditions 2 Races in the Filesystem.mp4 48.38 MB
    Videos/10 Race Conditions 3 Processes and Threads.mp4 34.34 MB
    Videos/10 Race Conditions 4 Races in Memory.mp4 34.73 MB
    Videos/10 Race Conditions 5 Signals and Reentrancy.mp4 31.81 MB
    Videos/11 Advanced Exploitation 1 Introduction.mp4 18.82 MB
    Videos/11 Advanced Exploitation 2 Heap Address Disclosure via Race.mp4 72.95 MB
    Videos/11 Advanced Exploitation 3 In-Memory Forensics.mp4 34.57 MB
    Videos/11 Advanced Exploitation 4 Exploit Primitives.mp4 94.57 MB
    Videos/11 Advanced Exploitation 5 End-to-end Pwnage.mp4 45.1 MB
    Videos/11 Advanced Exploitation 6 Escaping seccomp (for real).mp4 37.45 MB
    Videos/11 Advanced Exploitation 7 Kernel Races.mp4 23.7 MB
    Videos/12 Automatic Vulnerability Discovery 1 Introduction.mp4 22.1 MB
    Videos/12 Automatic Vulnerability Discovery 2 Static Analysis.mp4 26.5 MB
    Videos/12 Automatic Vulnerability Discovery 3 Fuzzing.mp4 40.96 MB
    Videos/12 Automatic Vulnerability Discovery 4 Dynamic Symbolic Execution.mp4 49.61 MB
    Videos/12 Automatic Vulnerability Discovery 5 The Cyber Grand Challenge.mp4 25.52 MB
    Welcome to pwn.college.html 14.41 KB
    Welcome to pwn.college_files/style.css 4.27 KB

Download Info

  • Tips

    “pwn.college - Hacking” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.